Category Archives: IT Strategy/Transformation

Thin Client Devices Revisited

Technology best forgotten or time for a renaissance?

Assembling the DevOps Jigsaw

The world we live in is increasingly digital. As the smart use of technology leads[...]

Exploiting the Software Advantage

Advances in digital technology create significant opportunities to transform both customer engagement and business operations.[...]

Infrastructure Readiness Temperature Check

IT infrastructures are often coping pretty well with current business requirements, but many IT professionals[...]

User-Centric Mobile Security

Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]

Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

Mobile Working without the Tears

As both company and personally owned mobile devices are increasingly used in business, understanding and[...]

Orchestrating the DevOps Tool Chain

A great deal has been written about how trends in digital communication and engagement are[...]

Data Virtualisation for DevOps

The DevOps movement is supported by a whole range of tools, and is particularly well[...]

Justifying end user computing investments

In a nutshell Device proliferation and loss of control over at least some end user[...]

Strategic DevOps Adoption

An interesting remark I heard at a recent CIO gathering was “DevOps is the first[...]

Eight Best Practices for Cloud Security

There’s been a lot of FUD spread around in recent years on the subject of[...]

Virgin Media Business and its SMB proposition

Over the years, I have grown increasingly sceptical about the ability of most Telcos to[...]

The ’feel-good’ factor is good for business

People who feel good while doing their job tend to work better, contribute more and[...]

Devices, recruitment and staff retention

In a nutshell Some say it’s not possible to recruit and retain good staff nowadays[...]

Build a DevOps culture

Everyone’s talking about DevOps, but not everyone can do it. This webcast covers the balance[...]

Snooper-proofing laptops and tablets?

Given how important the company’s data is and the ever more stringent nature of the[...]

A new approach to verifying user identity

By Tony Lock We all know that trying to authenticate our users when they access[...]

Inertia has its virtues, but change is happening

As the old year draws to a close it’s time for CIOs and analysts to[...]

Creating more harmony around end user computing

In a nutshell Tensions frequently arise between business units and the IT teams as users[...]

Rethinking desktop delivery

In a nutshell Many IT professionals are weary of the relentless Windows upgrade spiral and[...]

User flexibility without the risk

In a nutshell Most organisations are seeing users and business groups starting to make their[...]

The Politics and Practicalities of End User Computing

With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many[...]

So what you gonna do about DevOps?

Having to deal with the ‘next big thing’ once or twice a year is a[...]